Cisco Discovery 3 Certification Prep Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6802 | Total Attempts: 9,514,388
| Questions: 27
Please wait...
Question 1 / 27
0 %
0/100
Score 0/100
1. In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members?

Explanation

In VTP Transparent mode, a switch can create VLANs locally and does not participate in VTP advertisements, therefore not passing local VLAN information to other VTP domain members.

Submit
Please wait...
About This Quiz
CISCO Discovery 3 Certification Prep Quiz - Quiz

Prepare for Cisco Discovery 3 certification with focused content on network engineering principles. This material assesses essential skills for network setup, troubleshooting, and management, tailored for aspiring IT professionals aiming to excel in the networking field.

We’ll put your name on your report, certificate, and leaderboard.
2. What are two characteristics of an extended ACL? (Choose two.)

Explanation

Extended ACLs allow for the specification of various TCP/IP protocols and offer flexibility in filtering based on source and destination addresses, protocols, and specific port numbers, not limited to just TCP traffic or source address only.

Submit
3. Which two statements are true regarding a PPP connection between two Cisco routers?

Explanation

LCP (Link Control Protocol) is responsible for testing the quality of the link and managing compression. NCP (Network Control Protocol) allows multiple network layer protocols to be configured over the PPP link. CHAP authentication ensures secure password exchange, not plain text passwords.

Submit
4. Assuming VLSM is not being used, what impact will adding the command ip route 172.16.64.0 255.255.240.0 serial0/0 have on a router that is already operational in a network?

Explanation

The correct subnet for the given IP route is 172.16.64.0/20, which includes the range from 172.16.64.1 to 172.16.79.254. Therefore, the correct answer is that all packets within this range will be forwarded out serial0/0.

Submit
5. Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true?

Explanation

In the exhibit, the output of the show ip ospf neighbor command indicates that router RA has established adjacencies with all neighbor routers, making it the correct statement. RB having the lowest priority value, RC and RD having the lowest router IDs, and RA and RB being stuck in the 2-way state are all incorrect statements based on the information provided in the exhibit.

Submit
6. What solution was implemented for the sales representative to send sensitive information from a hotel room to corporate headquarters using the Internet?

Explanation

A Virtual Private Network (VPN) provides a secure way for the sales representative to access the Internet from the hotel room and transmit sensitive information to the corporate headquarters. Frame Relay is not typically used for secure Internet access. PPP with CHAP authentication and PPP with PAP authentication are authentication protocols used for point-to-point connections, but they do not provide the same level of security as a VPN.

Submit
7. Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate to SW3. On the basis of the partial output of the show vtp status command, what is the possible cause of the problem?

Explanation

In VTP (VLAN Trunking Protocol), a network device configured in transparent mode does not participate in VTP updates, which means VLAN changes made on other devices will not automatically propagate to a device in transparent mode. This explains why the VLAN configuration changes at SW2 did not propagate to SW3.

Submit
8. Which two criteria are used by STP to select a root bridge? (Choose two)

Explanation

Spanning Tree Protocol (STP) selects a root bridge based on the bridge priority and the base MAC address of the switches. The bridge priority is a configurable value that helps determine which switch becomes the root bridge. The base MAC address is used as a tiebreaker if there are multiple switches with the same bridge priority.

Submit
9. A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?

Explanation

For a Class B IP address (e.g., 172.16.0.0 to 172.31.255.255), the subnet mask 255.255.255.0 provides 256 possible networks (0-255) which is more than enough for the expected 150 networks. The other subnet masks mentioned do not offer sufficient network range for the requirement.

Submit
10. What term describes the value 2172416 highlighted in the output of the 'show ip eigrp topology' command?

Explanation

In EIGRP, the reported distance of the feasible successor is the metric recorded from the neighbor that is not the successor but satisfies the feasibility condition to potentially become a backup route. The feasible distance is the metric calculated by adding the local metric to the reported distance of the feasible successor. Therefore, in this context, the correct term to describe the value 2172416 is the reported distance of the feasible successor.

Submit
11. Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network?

Explanation

Router R2 is the correct choice to add the necessary commands for providing Internet access to all hosts in the network because it acts as the gateway connecting the internal network to the Internet. R1 and R3 are internal routers within the network, while ISP is the external Internet Service Provider and not a router within the network.

Submit
12. What do companies primarily gain from the services performed at the enterprise edge?

Explanation

Services performed at the enterprise edge primarily aim to strengthen security against potential malicious attacks, ensuring data protection and safeguarding company resources.

Submit
13. Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be placed to meet these requirements?

Explanation

Placing the ACL on R1's S0/1/0 outbound interface would allow the network administrator to deny Internet access to R2 LAN hosts while still allowing them to reach all other devices on the company networks. The other placements would not achieve the desired result.

Submit
14. Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?

Explanation

When an OSPF router is selecting the DR, it checks the parameters in the sequence C, B, A, D.

Submit
15. What two statements are true regarding EIGRP tables? (Choose two)

Explanation

In EIGRP, the successor route is the best route to reach a specific destination and is stored only in the routing table. The routing table also provides information on the time elapsed since a router adjacency was formed. The topology table shows feasible successors, not whether a route is in passive or active state. The neighbor table does list adjacent devices but does not show administrative distance.

Submit
16. Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output?
Submit
17. Which three statements are true about RSTP? (Choose three.)

Explanation

RSTP and STP have different number of port states, RSTP is an open standard protocol, and RSTP converges much faster than 50 seconds making the incorrect options.

Submit
18. Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?
Submit
19. Refer to the exhibit. R1 is connected to the Internet through its serial 0/0/0 interface. Hosts on the 192.168.100.0/24 LAN on R1 cannot communicate with hosts on the Internet. What two NAT configuration issues might explain this failure? (Choose two.)

Explanation

In this scenario, incorrect IP address assignment to the serial 0/0/0 interface could lead to communication failure between LAN hosts and the Internet. The other incorrect answers are not related to the specific issue of IP address misconfiguration on the serial interface.

Submit
20. Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?

Explanation

The correct answer is 'incorrect subnet mask on R2'. When the subnet mask on R2 is incorrect, it can lead to communication issues between the two interfaces, even if Layer 2 connectivity is present. The other incorrect options do not directly address the subnet mask issue that could be causing the problem.

Submit
21. When MD5 authentication is used for OSPF routing protocol authentication, what two facts are known about the key? (Choose two.)

Explanation

MD5 authentication in OSPF uses the key to generate a hash value, which is used for authentication. The actual key is never sent between routers, but the hash value is exchanged. Additionally, the key is not passed in plain text or encrypted form between routers. Even though the key is not directly transmitted, it is possible for an attacker to capture the hash value and potentially use a packet sniffer to intercept it.

Submit
22. Refer to the exhibit. If router RTA fails, which statement is true?

Explanation

When router RTA fails, communication is cut off between hosts A and B with hosts C and D, as well as the server. This leads to only hosts A and B being able to communicate with each other, but not with the other hosts or the server.

Submit
23. Which command should a network administrator issue to disable default summarization in an EIGRP network?

Explanation

The correct command to disable default summarization in an EIGRP network is 'Router(config-router)# no auto-summary'. This command is used to prevent EIGRP from automatically summarizing routes at network boundaries. The other options provided are not the correct commands for this purpose.

Submit
24. Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)

Explanation

The incorrect answers provided do not address the issues identified in the correct answer. The routing loop, OSPF Area configuration, and subnet mask validity are not relevant to the specific problems mentioned in the context of the question.

Submit
25. Refer to the exhibit. Which IP addressing scheme would be correct for the network?

Explanation

The correct IP addressing scheme for the network is where H1 is on subnet 172.18.0.0/16, H2 is on subnet 172.19.0.0/16, and H3 is on subnet 172.18.0.0/16. This ensures that each host is on a separate subnet within the same Class B network address (172.18.0.0/16).

Submit
26. An administrator is adding a new router to the network. The IP address 192.168.13.6/30 has been assigned to the connecting serial interface on R2. What IP address must the administrator assign to the serial interface of the new router?

Explanation

For a /30 subnet, the usable host IP addresses are 192.168.13.5 and 192.168.13.6. Since 192.168.13.6 is already assigned to the existing router, the next available IP address would be 192.168.13.5 for the new router.

Submit
27. After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.)

Explanation

The correct steps to simplify administration and control unwanted traffic are defining an ACL at the distribution layer to isolate packets and adding an ACL at the router in the enterprise edge to block the traffic. Using a Layer 3 switch to contain broadcasts, connecting remote locations directly to the intranet, and configuring all hosts with the same default gateway do not directly address or control the specific unwanted traffic issue identified in the question.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (27)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In which VTP mode can a switch create VLANs, ignore VTP messages, and...
What are two characteristics of an extended ACL? (Choose two.)
Which two statements are true regarding a PPP connection between two...
Assuming VLSM is not being used, what impact will adding the command...
Refer to the exhibit. The network is using OSPF as the routing...
What solution was implemented for the sales representative to send...
Refer to the exhibit. A network administrator noticed that the VLAN...
Which two criteria are used by STP to select a root bridge? (Choose...
A company is using a Class B IP addressing scheme and expects to need...
What term describes the value 2172416 highlighted in the output of the...
Refer to the exhibit. RIPv2 is configured in the network shown. Hosts...
What do companies primarily gain from the services performed at the...
Refer to the exhibit. A network administrator wishes to deny Internet...
Refer to the exhibit. In what sequence (from first to last) does an...
What two statements are true regarding EIGRP tables? (Choose two)
Refer to the exhibit. Assuming that all three routers are configured...
Which three statements are true about RSTP? (Choose three.)
Refer to the exhibit. A network support technician has been asked to...
Refer to the exhibit. R1 is connected to the Internet through its...
Refer to the exhibit. R1 and R2 are connected via serial interfaces....
When MD5 authentication is used for OSPF routing protocol...
Refer to the exhibit. If router RTA fails, which statement is true?
Which command should a network administrator issue to disable default...
Refer to the exhibit. Users on the 172.30.20.0/24 network are unable...
Refer to the exhibit. Which IP addressing scheme would be correct for...
An administrator is adding a new router to the network. The IP address...
After comparing a previous baseline to current network statistics, the...
Alert!

Advertisement